A physically secure, lightweight three-factor and anonymous user authentication protocol for IoT

Z Liu, C Guo, B Wang - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things has remarkable effects in human's daily life. It is important for users and
sensors to securely access data collected by low-cost sensors via Internet in real-time IoT …

A secure, lightweight, and anonymous user authentication protocol for IoT environments

S Son, Y Park, Y Park - Sustainability, 2021 - mdpi.com
The Internet of Things (IoT) is being applied to various environments such as telecare
systems, smart homes, and intelligent transportation systems. The information generated …

Physically secure lightweight anonymous user authentication protocol for internet of things using physically unclonable functions

S Banerjee, V Odelu, AK Das, S Chattopadhyay… - IEEe …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) acts as an umbrella for the Internet-enabled devices for various
applications, such as smart home, smart city, smart grid, and smart healthcare. The …

[HTML][HTML] A three-factor anonymous user authentication scheme for Internet of Things environments

H Lee, D Kang, J Ryu, D Won, H Kim, Y Lee - Journal of Information …, 2020 - Elsevier
To accelerate the deployment of fifth-generation (5G) cellular networks, millions of devices
are being connected to massive Internet of Things (IoT) networks. However, advances in the …

On the security of a secure and lightweight authentication scheme for next generation IoT infrastructure

AK Das, B Bera, M Wazid, SS Jamal, Y Park - IEEE Access, 2021 - ieeexplore.ieee.org
In recent years, the Internet of things (IoT) has become an encouraging communication
paradigm that has numerous applications including smart city, smart home and intelligent …

An anonymous two-factor authentication protocol for IoT-based applications

MJ Sadri, MR Asaar - Computer Networks, 2021 - Elsevier
Internet of things (IoT) allows people to establish a real-time connection with physical
objects. To fulfill this lifelong ambition, the infrastructure of Wireless Sensor Networks …

E-AUA: An efficient anonymous user authentication protocol for mobile IoT

X Zeng, G Xu, X Zheng, Y Xiang… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The emergence of the mobile Internet of Things (IoT) has made our lives smarter, relying on
its various mobile IoT devices and services provided. However, with the explosively …

A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things

D Rangwani, D Sadhukhan, S Ray, MK Khan… - Peer-to-peer Networking …, 2021 - Springer
Wireless sensor networks (WSNs) accomplish a key aspect in the Industrial Internet of
Things (IIoT) that has turned out to be the most flourishing perception for computerizations in …

Lightweight and anonymous mutual authentication protocol for edge IoT nodes with physical unclonable function

H Wang, J Meng, X Du, T Cao… - Security and …, 2022 - Wiley Online Library
Internet of Things (IoT) has been widely used in many fields, bringing great convenience to
people's traditional work and life. IoT generates tremendous amounts of data at the edge of …

LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT

H Abdi Nasib Far, M Bayat, A Kumar Das, M Fotouhi… - Wireless …, 2021 - Springer
Nowadays, wireless sensor networks (WSNs) are essential for monitoring and data
collection in many industrial environments. Industrial environments are usually huge. The …